Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
3261Publicado 2004“…Shortly after the film 4X4 vehicles were banned from driving on South African beaches…”
DVD -
3262Publicado 2023“…The central question of Transition 2.0 is this: what (and how) may a new government do to re-establish constitutional democracy, as well as repair membership within the European Union, without breaching the European rule of law? This volume demonstrates that EU law and international commitments impose constraints but also offer tools and assistance for facilitating the way back after rule of law and democratic backsliding. …”
Libro electrónico -
3263Publicado 2023“…Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. …”
Libro electrónico -
3264Publicado 2020“…"Cyberattacks and breaches are at an all-time high, and the threat of cybersecurity litigation is rising dramatically. …”
Vídeo online -
3265Publicado 2006“…He or she must essentially become a part of that family to encourage members to share their issues without the concern of breaching the confidence of the family. Counseling and Family Therapy with Latino Populations </E…”
Libro electrónico -
3266Publicado 2006“…"Whether formalized with elaborate settings and lighting or snapped at the beach to hold forever the pure joy in a child's face, portraits preserve people. …”
Libro electrónico -
3267Publicado 2018“…This ""unity"" on the streets was full of breaches and contradictions from the start. The people of Graz transformed not into a monolithic ""war society"" free of political, national, confessional or gender-specific conflicts. …”
Libro electrónico -
3268Publicado 2005“…Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable so…”
Libro electrónico -
3269Publicado 2011“…A storm grows, a sea otter pup is separated from her mother, and a young woman bound for adventure blows in to town. On a wild, windswept beach these lives collide and an entire species’ survival gets personal. …”
Ver más información
DVD -
3270
-
3271Publicado 2018Libro
-
3272Publicado 2022“…You'll be fascinated as the author explores real-world security breaches, including rogue Firefox extensions and Adobe password thefts. …”
Libro electrónico -
3273Publicado 2007“…Whether it's social engineering, network infrastructure attacks, or application hacking, security breaches in your systems can devastate your business or personal life. …”
Libro electrónico -
3274Publicado 2014“…Capturing the Moment is about a gesture, an expression, a ball in the net, a whale breaching, like Marilyn Monroe's skirt flying up or Alfred Eisenstaedt's image of a kiss between a soldier and nurse in Times Square. …”
Libro electrónico -
3275por Jodidio, PhilipTabla de Contenidos: “…Conté volum 6: 3DELUXE (Leonardo Glass Cube, Bad Drinurg Germany, 200-07), p. 52 ; 3LHD ARCHITECTS (Sports Hall Bale-Valle, Croatia, 2005-06), p. 58 ; ADJAYE / ASSOCIATES (Museum of Contemporany Art/Denver, Denver, Colorado, USA, 2004-07), p. 66 ; Al WEI WEI/FAKE DESIGN (Template, Documenta 12, Kassel, Germany, 2007), p. 72 ; TADAO ANDO (21_21 Design Sight, Minato-ku, Tokyo, Japan, 2004-07), p. 76 ; ALEJANDRO ARAVENA (Centro Tecnológico, Universidad Católica, San Joaquin Campus, Santiago, Chile, 2003-06), p. 84 ; ARGE GRAZIOLI KRISCHANITZ (Museum Rietberg Extension, Zurich, Switzerland, 2004-06), p. 92 ; SHIGERU BAN (Post-Tsunami Rehabilitation Houses, Kirinda, Hambantota, Sri Lanka, 2005-07), p. 98 ; BARKOW LEISINGER (Trutec Building, Seoul, Korea, 2005-06), p. 102 ; BERNARDES + JACOBSEN (TIM Festival 2007, Rio de Janeiro, Rio de Janeiro, Brazil, 2007), p. 108 ; COOP HIMMELB(L)AU (Akron Art Museum, Akron, Ohio, USA, 2001-07 / BMW Welt, Munich, Germany, 2001-07), p. 114 ; OLAFUR ELIASSON ( The New York City Waterfalls, New York, New York, USA, 2008 / Serpentine Gallery Pavilion 2007, Kensington Gardens, London, UK, 2007), p. 134 ; EMERGENT (Shenzen Museum of Contemporany Art, Shenzhen, China, 2007 / National Library of the Czech Republic, Prague, Czech Republic, 2006-07), p. 144 ; KSP ENGEL UNO ZIMMERMANN (Bergen-Belsen Documentation and Information Center, Celle, Germany, 2005-07), p. 156 ; FAM ARQUITECTURA (March 11 Memorial for the victims, Madrid, Spain, 2005-07), p. 164 ; FOSTER AND PARTNERS (Russia Tower, Moscow, Russia, 2006- / Crystal Island, Moscow, Russia, 2006-), p. 168 ; TERUNOBU FUJIMORI (Chashitsu Tetsu (Teahouse Tetsu), Kiyoharu Shirakaba Museum, Nakamaru, Hokuto City, Yamanashi, Japan, 2005), p. 174 ; MASSIMILIANO FUKSAS(Zénith Strasbourg, Ecxbolsheim, Strabourg, France, 2003-07), p. 180 ; ANTÓN GARCÍA-ABRIL (SGAE Central Ofiice, Santiago de Compostela, Galicia, Spaim, 2005-07), p. 188 ; DIONISIO GONZALEZ (Favela Series, São Paulo, São Paulo, Brazil, 2004-07), p. 196 ; ZAHA HADID (Nordpark Railway, Innsbruck, Austria, 2004-07), p. 202 ; HEATHERWICK STUDIO (East Beach Café, Littlehampton, West Sussex, UK, 2005-07), p. 216 ; HERZOG & DE MEURON (National Stadium, Main Stadium for the 2008 Olympic Games, Beijing, China, 2003-08 / Caixa Forum, Madrid, Spain, 2001-08), p. 222 ; STEVEN HOLL (The Nelson.Atkins Museum of Art, Bloch Building, Kansas City, Missouri, USA, 2002-07), p. 240 ; HOLZER KOBLER (Arche Nebra Visitor’s Center, Wangen, Germany, 2005-07), p. 250 ; JUNYA ISHIGAMI (Facility, Kanagawa Institute of Technology, Kanagawa, Japan, 2007-08), p. 258 ; TOYO ITO (Tama Art University New Library, Hachioji City, Tokyo, Japan, 2004-07), p. 266 ; JAKOB + MACFARLANE (City of Fashion and Design, Paris, France, 2007-08), p. 274 ; JENSEN & SKODVIN (Tautra Maria Convent, Tautra Island, Norway, 2004-06), p. 280 ; CARLOS JIMENEZ (Rice Libray Service Center (2002-05) and Rice Data Center (2006-07) / Rice University South Campus Master Plan, Houston, Texas, USA), p. 288 ; KENGO KUMA (Suntory Museum of Art, Minato-ku, Tokyo, Japan, 2004-07), p. 294 ; LASSILA HIRVILAMMI (Kärsämäki Church, Kärsämäki, Finland, 1999-2004), p. 302 ; LEGORRETA + LEGORRETA (La Purificadora BoutiqueHotel, Puebla, Mexico, 2006-07), p. 308 ; DANIEL LIBESKIND ( Royal Ontario Museum Extension, Toronto, Canada, 2002-07), p. 314 ; LIN FINN GEIPEL + GIULIA ANDI (Alvéole 14, Submarine Base Rehabilitation, Quartier Ville Port, Saint-Nazaire, France, 2005-07), p. 320 ; MII ARCHITECTEN (Information Center, National Center for Arboriculture, Baarn, the Netherlands, 2001-03), p. 330 ; MADA S.P.A.M. …”
Publicado 2001
Libro -
3276“…Compromise of a single Oracle Database can result in tens of millions of breached records costing millions in breach-mitigation activity. …”
Libro electrónico -
3277
-
3278
-
3279Publicado 2012“…Newly widowed, Sarah tries to drown herself, only to discover an impossible, alternative world. Back on the beach she asks herself, Did that really happen? Or am I losing my mind? …”
Libro electrónico -
3280por Thornton, Frank“…Coverage includes: security breaches for monetary gain (hacking a shops RFID syst…”
Publicado 2006
Libro electrónico